Security
Last updated: April 30, 2026
Legal work is sensitive. Security is a first-class concern at eLaw — every architectural choice we make is informed by it.
Encryption
In transit. All connections to the Service use TLS 1.2 or higher. HSTS is enforced and we redirect HTTP to HTTPS.
At rest.Documents, database content, and backups are encrypted using AES-256. Encryption keys are managed by the cloud provider's KMS and rotated on a defined schedule.
Authentication & Access Control
User passwords are hashed with bcrypt (12 salt rounds). Sessions use short-lived access tokens (15 min) paired with rotating refresh tokens (30 days). Tokens are stored in HTTP-only, Secure, SameSite cookies.
Within the Service, role-based access control isolates Admins, Firm Admins, Lawyers, and Paralegals. Each API request is checked against the firm workspace ID — there is no cross-firm data access.
Single Sign-On via SAML 2.0 is available on the Enterprise plan.
Multi-Tenant Isolation
Every record in the database is scoped to a firm. Document chunks, embeddings, conversations, and agent runs are filtered by firm ID at the query layer. We perform regular tests to verify isolation.
Infrastructure
The Service runs on hardened cloud infrastructure with private networking between application and data tiers. Production access is restricted to a small number of operators with multi-factor authentication and is audited.
Infrastructure changes flow through code review and CI; production deploys require approval and produce immutable, signed artifacts.
Audit Logging
Authentication events, billing changes, document access, and administrative actions are logged. Firm Admins on Professional and Enterprise plans can review audit logs from the dashboard.
AI Provider Safeguards
Customer Data sent to model providers (e.g., Anthropic) is governed by enterprise terms that prohibit those providers from using your data to train their models. Prompts and outputs are not shared with other customers.
Data Retention & Deletion
On account termination, Customer Data is deleted from production within 30 days. Backups expire on our standard rotation (typically 90 days). Customers may delete individual documents at any time from the vault.
Incident Response
We maintain an incident response plan covering detection, triage, containment, eradication, recovery, and post-incident review. In the event of a breach affecting Customer Data, we will notify affected customers without undue delay and within the timelines set in our DPA.
Compliance
Our security program is designed against SOC 2 controls. We support GDPR, UK GDPR, and CCPA/CPRA via our Data Processing Agreement. Compliance reports and questionnaires are available to Enterprise customers under NDA.
Personnel
Employees complete security and privacy training at hire and annually. Production access follows least-privilege; we revoke access promptly upon role change or departure.
Vulnerability Disclosure
We welcome reports from security researchers. If you believe you have found a vulnerability, please email security@elawplatform.com with reproduction steps. Please do not access data that is not your own, perform DoS testing, or publicly disclose before we've had reasonable time to remediate.
We will acknowledge receipt within two business days and provide a remediation timeline within ten.
Contact
Security questions or compliance documentation requests: security@elawplatform.com.